Content deleted Content added
Deltaspace42 (talk | contribs) m +{{Crypto-stub}} using StubSorter |
Added simple description, added reference, moved non-referencing links to Further Reading |
||
Line 1:
'''Password-based cryptography''' is the study of password-based key encryption, decryption, and authorization. It generally refers
▲'''Password-based cryptography''' generally refers to two distinct classes of methods:
*Single-party methods
Line 10 ⟶ 8:
==Multi-party methods==
[[Password-authenticated key agreement]] systems allow two or more parties that agree on a password (or password-related data) to derive shared keys without exposing the password or keys to network attack.<ref>{{Cite journal |last=Halevi |first=Shai |last2=Krawczyk |first2=Hugo |date=Aug. 1999 |title=Public-key cryptography and password protocols |url=https://dl.acm.org/doi/abs/10.1145/322510.322514 |journal=ACM Trans. Inf. Syst. Secur. |publisher=Association for Computing Machinery |volume=2 |issue=3 |pages=230-268 |doi=10.1145/322510.322514 |issn=1094-9224 |via=ACM Digital Library}}</ref> Earlier generations of [[challenge–response authentication]] systems have also been used with passwords, but these have generally been subject to eavesdropping and/or brute-force attacks on the password.
==See also==
Line 18 ⟶ 16:
== References ==
<references />
== Further Reading ==
* https://link.springer.com/chapter/10.1007/978-3-642-32009-5_19
|